Ⅰ. Instruction(领会&识记)
-
The computational thinking of ABSTRACTION
The OSI/RM & TCP/IP Modal
OS Architecture
Computer Architecture
Software Architecture
The transistor “Switch” Modal
Ⅱ. The Information Layer(领会&简单运用)
-
Binary System & Arithmetic
Signed-magnitude representation
Two’s Complement scheme
Fractional values [ eg. (3.0625)10 = (?)2
-
Information Representation
Analog & Digital System
Raster & rector-graphic images
Test compression ( especially: Huffman Encoding & DeCoding)
Ⅲ. The Hardware Layer(识记&简单运用)
-
The “Switch” model for transistors
-
Constructing Logic Gates with Transistors
-
Combination & Sequential Logic*
-
Logic Gates Symbols & Usages
-
Von Newman Architecture
-
Stored-Program Concept
-
Components of a computer system
-
Assembler, Linker & Loder
Ⅳ. The Programming Layer(识记&领会&简单运用&综合运用)
-
The fetch-execute cycle (with assembly/machine-code examples)
-
Software testing & its approaches
-
Algorithm & its representative instances -> eg. Sorting &Searching
-
Abstract Data Types (Concepts & Examples -> line ones & tree-based)
-
Programming Language Paradigms
Ⅴ. The Operating System(识记&领会)
-
Roles of OSes
-
Multiprogramming
-
Process (eg. Process life cycle)
Files (text & binary)
File Systems (eg. Directories, file system hierarchy)
File System Operations
Ⅵ. The Applications Layer(识记&领会)
-
Machine Learning Paradigm
eg. Supervised, Unsupervised, Reinforcement, Semi-Supervised
-
Conventional Algorithm & Machine Learning*
-
Block Chain* (characteristics & concepts)
-
Database management systems
eg. Application development, Usage Scenarios
-
Spreadsheets (like “excel”) [12.2 in textbook]
Ⅶ. The communication Layer(识记&领会&简单运用)
-
OSI/RM & TCP/IP Models
-
Circuit & Packet Switching
-
LANs, WANs & the Internet
-
Information security (eg. The CIA tried)
-
Hash functions, secret-key security, Public-key security(eg. Digital Signature)
Ⅷ. Conclusion(识记&领会)
-
Limits of finite-precision representation
-
Limits of Software testing (eg. Formal Verification)
-
Software Complexity